Skip to content

Commit 258dee5

Browse files
authored
Changing headers
1 parent 71b3241 commit 258dee5

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/sql-database/sql-database-auditing.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ The following section describes the configuration of auditing using the Azure po
8383

8484
![storage options](./media/sql-database-auditing-get-started/auditing-select-destination.png)
8585

86-
### <a id="audit-storage-destination">Audit to storage destination</a>
86+
### <a id="audit-storage-destination"></a>Audit to storage destination
8787

8888
To configure writing audit logs to a storage account, select **Storage** and open **Storage details**. Select the Azure storage account where logs will be saved, and then select the retention period. Then click **OK**. Logs older than the retention period are deleted.
8989

@@ -102,13 +102,13 @@ To configure writing audit logs to a storage account, select **Storage** and ope
102102
- When using AAD Authentication, failed logins records will *not* appear in the SQL audit log. To view failed login audit records, you need to visit the [Azure Active Directory portal]( ../active-directory/reports-monitoring/reference-sign-ins-error-codes.md), which logs details of these events.
103103
- Auditing on [Read-Only Replicas](sql-database-read-scale-out.md) is automatically enabled. For further details about the hierarchy of the storage folders, naming conventions, and log format, see the [SQL Database Audit Log Format](sql-database-audit-log-format.md).
104104

105-
### <a id="audit-log-analytics-destination">Audit to Log Analytics destination</a>
105+
### <a id="audit-log-analytics-destination"></a>Audit to Log Analytics destination
106106

107107
To configure writing audit logs to a Log Analytics workspace, select **Log Analytics (Preview)** and open **Log Analytics details**. Select or create the Log Analytics workspace where logs will be written and then click **OK**.
108108

109109
![LogAnalyticsworkspace](./media/sql-database-auditing-get-started/auditing_select_oms.png)
110110

111-
### <a id="audit-event-hub-destination">Audit to Event Hub destination</a>
111+
### <a id="audit-event-hub-destination"></a>Audit to Event Hub destination
112112

113113
> [!WARNING]
114114
> Enabling auditing on a server that has a SQL pool on it **results in the SQL pool being resumed and re-paused again** which may incur billing charges.
@@ -193,7 +193,7 @@ If you chose to write audit logs to an Azure storage account, there are several
193193

194194
<!--The description in this section refers to preceding screen captures.-->
195195

196-
#### Auditing geo-replicated databases
196+
### Auditing geo-replicated databases
197197

198198
With geo-replicated databases, when you enable auditing on the primary database the secondary database will have an identical auditing policy. It is also possible to set up auditing on the secondary database by enabling auditing on the **secondary server**, independently from the primary database.
199199

@@ -205,7 +205,7 @@ With geo-replicated databases, when you enable auditing on the primary database
205205
>[!IMPORTANT]
206206
>With database-level auditing, the storage settings for the secondary database will be identical to those of the primary database, causing cross-regional traffic. We recommend that you enable only server-level auditing, and leave the database-level auditing disabled for all databases.
207207
208-
#### Storage key regeneration
208+
### Storage key regeneration
209209

210210
In production, you are likely to refresh your storage keys periodically. When writing audit logs to Azure storage, you need to resave your auditing policy when refreshing your keys. The process is as follows:
211211

@@ -220,7 +220,7 @@ In production, you are likely to refresh your storage keys periodically. When wr
220220

221221
## <a id="manage-auditing"></a>Manage Azure SQL Server and Database auditing
222222

223-
#### Using Azure PowerShell
223+
### Using Azure PowerShell
224224

225225
**PowerShell cmdlets (including WHERE clause support for additional filtering)**:
226226

@@ -233,7 +233,7 @@ In production, you are likely to refresh your storage keys periodically. When wr
233233

234234
For a script example, see [Configure auditing and threat detection using PowerShell](scripts/sql-database-auditing-and-threat-detection-powershell.md).
235235

236-
#### Using REST API
236+
### Using REST API
237237

238238
**REST API**:
239239

@@ -249,7 +249,7 @@ Extended policy with WHERE clause support for additional filtering:
249249
- [Get Database *Extended* Auditing Policy](/rest/api/sql/database%20extended%20auditing%20settings/get)
250250
- [Get Server *Extended* Auditing Policy](/rest/api/sql/server%20auditing%20settings/get)
251251

252-
#### Using Azure Resource Manager templates
252+
### Using Azure Resource Manager templates
253253

254254
You can manage Azure SQL database auditing using [Azure Resource Manager](../azure-resource-manager/management/overview.md) templates, as shown in these examples:
255255

0 commit comments

Comments
 (0)